Search results for: renal access
1795 Pros and Cons of Distance Learning in Europe and Perspective for the Future
Authors: Aleksandra Ristic
Abstract:
The Coronavirus Disease – 2019 hit Europe in February 2020, and infections took place in four waves. It left consequences and demanded changes for the future. More than half of European countries responded quickly by declaring a state of emergency and introducing various containment measures that have had a major impact on individuals’ lives in recent years. Closing public lives was largely achieved by limited access and/or closing public institutions and services, including the closure of educational institutions. Teaching in classrooms converted to distance learning. In the research, we used a quantitative study to analyze various factors of distance learning that influenced pupils in different segments: teachers’ availability, family support, entire online conference learning, successful distance learning, time for themselves, reliable sources, teachers’ feedback, successful distance learning, online participation classes, motivation and teachers’ communication and theoretical review of the importance of digital skills, e-learning Index, World comparison of e-learning in the past, digital education plans for the field of Europe. We have gathered recommendations and distance learning solutions to improve the learning process by strengthening teachers and creating more tiered strategies for setting and achieving learning goals by the children.Keywords: availability, digital skills, distance learning, resources
Procedia PDF Downloads 1021794 Developing House’s Model to Assess the Translation of Key Cultural Texts
Authors: Raja Al-Ghamdi
Abstract:
This paper aims to systematically assess the translation of key cultural texts. The paper, therefore, proposes a modification of the discourse analysis model for translation quality assessment introduced by the linguist Juliane House (1977, 1997, 2015). The data for analysis has been chosen from a religious text that has never been investigated before. It is an overt translation of the biography of Prophet Mohammad. The book is written originally in Arabic and translated into English. A soft copy of the translation, entitled The Sealed Nectar, is posted on numerous websites including the Internet Archive library which offers a free access to everyone. The text abounds with linguistic and cultural phenomena relevant to Islamic and Arab lingua-cultural context which make its translation a challenge, as well as its assessment. Interesting findings show that (1) culturemes are rich points and both the translator’s subjectivity and intervention are apparent in mediating them, (2) given the nature of historical narration, the source text reflects the author’s positive shading, whereas the target text reflects the translator’s axiological orientation as neutrally shaded, and, (3) linguistic gaps, metaphorical expressions and intertextuality are major stimuli to compensation strategies.Keywords: Arabic-English discourse analysis, key cultural texts, overt translation, quality assessment
Procedia PDF Downloads 2821793 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network
Authors: Kamyar Fakhr, Roozbeh Salmani
Abstract:
Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.Keywords: biometric system, convolutional neural network, cyber-attack, secure
Procedia PDF Downloads 2191792 Tenure Security, Agricultural Diversity and Food Security
Authors: Amanuel Hadera Gebreyesus
Abstract:
In the literature, the study of tenure and food security has largely involved separate lines of inquiry. In effect, the nexus among these has received little attention; and the underinvestment in research related to the relationship between tenure and food security deters generation of tenure-related knowledge and policy guidance for improving food and nutrition security. Drawing from this motivation, we study the relationship among tenure security, agricultural diversity and food security and dietary diversity. We employ IV approaches to examine the effect of tenure security and agricultural diversity on food security and dietary diversity. We find tenure security is inversely related with food insecurity as shown by its negative association with hunger scale, hunger index and hunger category. On the other hand, results suggest that tenure security improves minimum dietary diversity of women while we find no association with child dietary diversity. Moreover, agricultural diversity is positively related with minimum dietary diversity of women, which may point to higher accessibility and consumption of dietary food groups by women. Also, findings suggest that farmers use their human (knowledge and skills) and resource (land) endowments to improve food security and dietary diversity. An implication from this is the importance of not only improving access to land but also long-term tenure security to promote agricultural diversity, food security and dietary diversity.Keywords: tenure security, food security, agricultural diversity, dietary diversity, women
Procedia PDF Downloads 2171791 Importance of Access to Public Information on Modern Slavery for Brazil's Livestock Sector
Authors: Juliana Brandao, Holly Gibbs, Lisa Naughton, Lisa Rausch
Abstract:
The Brazilian Amazon continues to be plagued by modern day slave labor, specifically within the cattle production industry. In response to this issue, modern day anti-slavery activists have implemented additional regulations designed to combat slave labor associated with cattle. These regulations have been incorporated into existing agreements designed to control deforestation. The goal of these rules is to prevent the trade of beef contaminated with modern slave labor between supplier farms and slaughterhouses. In this study, we identify farms that make use of modern slave labor, and we use cattle transaction data to track the sale of cattle between farms and slaughterhouses. Our analysis reveals that slaughterhouses, which have signed cattle agreements that include requirements to refuse cattle associated with modern slave labor, have avoided buying cattle from suppliers that were on the dirty list. This trend is especially evident when the "dirty lists" that identify modern-day slave labor users are made publicly accessible online. We conclude that the "dirty list" of modern-day slave labor users should be maintained on publicly available websites to allow slaughterhouses, retailers, and consumers to send powerful market signals that discourage the use of modern-day slave labor.Keywords: cattle ranchers, modern slave labor, deforestation, brazilian amazon
Procedia PDF Downloads 1161790 AI as a Tool Hindering Digital Education
Authors: Justyna Żywiołek, Marek Matulewski
Abstract:
The article presents the results of a survey conducted among students from various European countries. The aim of the study was to understand how artificial intelligence (AI) affects educational processes in a digital environment. The survey covered a wide range of topics, including students' understanding and use of AI, its impact on motivation and engagement, interaction and support issues, accessibility and equity, and data security and privacy concerns. Most respondents admitted having difficulties comprehending the advanced functions of AI in educational tools. Many students believe that excessive use of AI in education can decrease their motivation for self-study and active participation in classes. Additionally, students reported that interaction with AI-based tools is often less satisfying compared to direct contact with teachers. Furthermore, the survey highlighted inequalities in access to advanced AI tools, which can widen the educational gap between students from different economic backgrounds. Students also expressed concerns about the security and privacy of their personal data collected and processed by AI systems. The findings suggest that while AI has the potential to support digital education, significant challenges need to be addressed to make these tools more effective and acceptable for students. Recommendations include increasing training for students and teachers on using AI, providing more interactive and engaging forms of education, and implementing stricter regulations on data protection.Keywords: AI, digital education, education tools, motivation and engagement
Procedia PDF Downloads 281789 Design and Construction of Models of Sun Tracker or Sun Tracking System for Light Transmission
Authors: Mohsen Azarmjoo, Yasaman Azarmjoo, Zahra Alikhani Koopaei
Abstract:
This article introduces devices that can transfer sunlight to buildings that do not have access to direct sunlight during the day. The transmission and reflection of sunlight are done through the movement of movable mirrors. The focus of this article is on two models of sun tracker systems designed and built by the Macad team. In fact, this article will reveal the distinction between the two Macad devices and the previously built competitor device. What distinguishes the devices built by the Macad team from the competitor's device is the different mode of operation and the difference in the location of the sensors. Given that the devices have the same results, the Macad team has tried to reduce the defects of the competitor's device as much as possible. The special feature of the second type of device built by the Macad team has enabled buildings with different construction positions to use sun tracking systems. This article will also discuss diagrams of the path of sunlight transmission and more details of the device. It is worth mentioning that fixed mirrors are also placed next to the main devices. So that the light shining on the first device is reflected to these mirrors, this light is guided within the light receiver space and is transferred to the different parts around by steel sheets built in the light receiver space, and finally, these spaces benefit from sunlight.Keywords: design, construction, mechatronic device, sun tracker system, sun tracker, sunlight
Procedia PDF Downloads 841788 Leveraging NFT Secure and Decentralized Lending: A Defi Solution
Authors: Chandan M. S., Darshan G. A., Vyshnavi, Abhishek T.
Abstract:
In the evolving world of technology and digital assets, non-fungible tokens (NFTs) have emerged as the latest advancement. These digital assets represent ownership of intangible items and hold significant value. Unlike cryptocurrencies, like Ethereum or Bitcoin, NFTs cannot be exchanged due to their nature. Each NFT has an indivisible value. NFTs not only pave the way for financial services but also open up fresh opportunities for creators, buyers and artists. To revolutionize financing in the DeFi space, this proposed approach utilizes NFTs generated from digital arts. By eliminating intermediaries, this innovative method ensures trust and security in transactions. The idea entails automating borrower-lender interactions through contracts while securely storing data using blockchain technology. Borrowers can obtain funding by leveraging assets such as estate, artwork and collectibles that are often illiquid. The key component of this system is contracts that independently execute lending agreements and collateral transfers within predefined parameters. By leveraging the Ethereum blockchain, this project aims to provide consumers with access to a platform offering a wide range of financial services. The demonstration illustrates how NFT lending and borrowing is managed through contracts, providing a secure and trustworthy transaction environment.Keywords: blockchain, defi, NFT, ethereum, marketplace
Procedia PDF Downloads 531787 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks
Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar
Abstract:
Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.Keywords: mobile operating system, security, privacy, Malware
Procedia PDF Downloads 881786 The Effect of Perceived Organizational Support and Leader Member Exchange on Turnover Intention: A Field Study in the Healthcare Industry
Authors: Mehtap Öztürk, Adem Öğüt, Emine Öğüt
Abstract:
Leader member exchange is considered as relationship-based approach to leadership. The focal point of this theory is that effective leadership processes occur when leaders and followers are able to develop mature leadership relationships and thus gain access to a variety of benefits these relationships bring. In this context, it can be claimed that the quality of leader member exchange appears to have a strong affect on perceived organizational support and reduce turnover intention. The purpose of this study is to determine the relationship between the levels of leader member exchange, perceived organizational support and turnover intention on the employees of a health institution operating in the province of Konya. A field study based on survey method on 134 physicians who are employees of a health institution operating in the mentioned sample. In accordance with this purpose, it has been observed that there is a negative and statistically significant relationship between leader member exchange and turnover intention. Furthermore, it has been also realized that there is a negative and statistically significant relationship between perceived organizational support and turnover intention.Keywords: leader member exchange, perceived organizational support, social exchange theory, turnover intention
Procedia PDF Downloads 3571785 Effect of Electronic Banking on the Performance of Deposit Money Banks in Nigeria: Using ATM and Mobile Phone as a Case Study
Authors: Charity Ifunanya Osakwe, Victoria Ogochuchukwu Obi-Nwosu, Chima Kenneth Anachedo
Abstract:
The study investigates how automated teller machines (ATM) and mobile banking affect deposit money banks in the Nigerian economy. The study made use of time series data which were obtained from the Central Bank of Nigeria Statistical Bulletin from 2009 to 2021. The Central Bank of Nigeria (CBN) data on automated teller machine and mobile phones were used to proxy electronic banking while total deposit in banks proxied the performance of deposit money banks. The analysis for the study was done using ordinary least square econometric technique with the aid of economic view statistical package. The results show that the automated teller machine has a positive and significant effect on the total deposits of deposit money banks in Nigeria and that making use of deposits of deposit money banks in Nigeria. It was concluded in the study that e-banking has equally increased banking access to customers and also created room for banks to expand their operations to more customers. The study recommends that banks in Nigeria should prioritize the expansion and maintenance of ATM networks as well as continue to invest in and develop more mobile banking services.Keywords: electronic, banking, automated teller machines, mobile, deposit
Procedia PDF Downloads 541784 Pyelography by Intraosseous Injection of Iodixanol in Persian Squirrel
Authors: Mehdi Tavana, Seyedeh Zeinab Peighambarzadeh
Abstract:
Pyelography is used for morphologic and especially functional studies of the urinary tracts. There are many indications for excretory Pyelography in humans and animals. Intravenous Pyelography is the most practical method; other Pyelography techniques were manipulated because of difficulties for finding veins in small size of the patients. At the best of times, the combination of small veins and abundant subcutaneous tissue makes vascular access difficult or impossible, therefore, another methods of administration of contrast media is desired. This study was performed to evaluate the feasibility of intraosseous injection of iodixanol in providing a safe and diagnostic urogram in Persian squirrel. Fourteen hundred mg iodine per kilogram body weight of iodixanol was injected subcutaneously over tibial tuberosity on ten clinically healthy adult Persian squirrels with no signs of urinary system disorder. Lateral and ventrodorsal radiographs were taken every 2 minutes until the pyelogram was finished. Intraosseous injection of iodixanol was successful to show nephrogram, pyelogram, uretrogram and cystogram clearly. There were no abnormal clinical signs after one week of experiments. Biochemical and hematological profiles were in normal ranges. It is concluded that intraosseous Pyelography is an effective and reliable method for Pyelography studies in squirrel. Microscopic examinations of the kidneys and the site of injection after one week were normal.Keywords: pyelography, intraosseous injection, iodixanol, persian squirrel
Procedia PDF Downloads 5241783 Views on Abortion and Case Law on International and European Levels: Past and Present Jurisprudence
Authors: Aurélie Cassiers
Abstract:
In this presentation, an overview is given of the freedom of states to legislate concerning abortion. Today, access to safe and legal abortion is still a hot topic in many countries in the world. Abortion policies try to strike a balance between women’s rights to self-determination and private life on the one hand, and the protection of the life of unborn children on the other. Each country has different religious, cultural and political views on abortion, and therefore specific legislations. However, citizens may submit a complaint at international courts when they find their national legislation too restrictive. The study is discussed of the development of the ECtHR, UNCHR, and IACHR case law, regarding the question of the ‘right to abort’ and indirectly of the protection of the unborn children. Each relevant case is analyzed to answer the following questions: Is the unborn child protected, and if so, how? Why does the woman want to abort and how is her interest or right protected? How is a fair balance reached between the different interests? Is the state completely free to write policies that restrict abortion? What are the factors to determine the margin of appreciation of the state? In conclusion, does this specific court recognize a right to abort, and if so, under which conditions? To conclude, this presentation shows that each court has its own perspective on and perception of abortion, and its own criteria to determine whether the state is complying with international norms regarding individual liberty and protection of the children.Keywords: abortion, international courts, unborn children, women rights
Procedia PDF Downloads 1291782 Enhancing Internet of Things Security: A Blockchain-Based Approach for Preventing Spoofing Attacks
Authors: Salha Abdullah Ali Al-Shamrani, Maha Muhammad Dhaher Aljuhani, Eman Ali Ahmed Aldhaheri
Abstract:
With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.Keywords: internet of things, spoofing, IoT, access control, blockchain, raspberry pi
Procedia PDF Downloads 741781 The Systematic Impact of Climatic Disasters on the Maternal Health in Pakistan
Authors: Yiqi Zhu, Jean Francois Trani, Rameez Ulhassan
Abstract:
Extreme weather phenomena increased by 46% between 2007 and 2017 and have become more intense with the rise in global average temperatures. This increased intensity of climate variations often induces humanitarian crises and particularly affects vulnerable populations in low- and middle-income countries (LMICs). Expectant and lactating mothers are among the most vulnerable groups. Pakistan ranks 10th among the most affected countries by climate disasters. In 2022, monsoon floods submerged a third of the country, causing the loss of 1,500 lives. Approximately 650,000 expectant and lactating mothers faced systematic stress from climatic disasters. Our study used participatory methods to investigate the systematic impact of climatic disasters on maternal health. In March 2023, we conducted six Group Model Building (GMB) workshops with healthcare workers, fathers, and mothers separately in two of the most affected areas in Pakistan. This study was approved by the Islamic Relief Research Review Board. GMB workshops consist of three sessions. In the first session, participants discussed the factors that impact maternal health. After identifying the factors, they discussed the connections among them and explored the system structures that collectively impact maternal health. Based on the discussion, a causal loop diagram (CLD) was created. Finally, participants discussed action ideas that could improve the system to enhance maternal health. Based on our discussions and the causal loop diagram, we identified interconnected factors at the family, community, and policy levels. Mothers and children are directly impacted by three interrelated factors: food insecurity, unstable housing, and lack of income. These factors create a reinforcing cycle that negatively affects both mothers and newborns. After the flood, many mothers were unable to produce sufficient breastmilk due to their health status. Without breastmilk and sufficient food for complementary feeding, babies tend to get sick in damp and unhygienic environments resulting from temporary or unstable housing. When parents take care of sick children, they miss out on income-generating opportunities. At the community level, the lack of access to clean water and sanitation (WASH) and maternal healthcare further worsens the situation. Structural failures such as a lack of safety nets and programs associated with flood preparedness make families increasingly vulnerable with each disaster. Several families reported that they had not fully recovered from a flood that occurred ten years ago, and this latest disaster destroyed their lives again. Although over twenty non-profit organizations are working in these villages, few of them provide sustainable support. Therefore, participants called for systemic changes in response to the increasing frequency of climate disasters. The study reveals the systematic vulnerabilities of mothers and children after climatic disasters. The most vulnerable populations are often affected the most by climate change. Collaborative efforts are required to improve water and forest management, strengthen public infrastructure, increase access to WASH, and gradually build climate-resilient communities. Governments, non-governmental organizations, and the community should work together to develop and implement effective strategies to prevent, mitigate, and adapt to climate change and its impacts.Keywords: climatic disasters, maternal health, Pakistan, systematic impact, flood, disaster relief.
Procedia PDF Downloads 771780 Patient Perspectives on Telehealth During the Pandemic in the United States
Authors: Manal Sultan Alhussein, Xiang Michelle Liu
Abstract:
Telehealth is an advanced technology using digital information and telecommunication facilities that provide access to health services from a distance. It slows the transmission factor of COVID-19, especially for elderly patients and patients with chronic diseases during the pandemic. Therefore, understanding patient perspectives on telehealth services and the factors impacting their option of telehealth service will shed light on the measures that healthcare providers can take to improve the quality of telehealth services. This study aimed to evaluate perceptions of telehealth services among different patient groups and explore various aspects of telehealth utilization in the United States during the COVID-19 pandemic. An online survey distributed via social media platforms was used to collect research data. In addition to the descriptive statistics, both correlation and regression analyses were conducted to test research hypotheses. The empirical results highlighted that the factors such as accessibility to telehealth services and the type of specialty clinics that the patients required play important roles in the effectiveness of telehealth services they received. However, the results found that patients’ waiting time to receive telehealth services and their annual income did not significantly influence their desire to select receiving healthcare services via telehealth. The limitations of the study and future research directions are discussed.Keywords: telehealth, patient satisfaction, pandemic, healthcare, survey
Procedia PDF Downloads 1121779 Bacteriological Safety of Sachet Drinking Water Sold in Benin City, Nigeria
Authors: Stephen Olusanmi Akintayo
Abstract:
Access to safe drinking water remains a major challenge in Nigeria, and where available, the quality of the water is often in doubt. An alternative to the inadequate clean drinking water is being found in treated drinking water packaged in electrically heated sealed nylon and commonly referred to as “sachet water”. “Sachet water” is a common thing in Nigeria as the selling price is within the reach of members of the low socio- economic class and the setting up of a production unit does not require huge capital input. The bacteriological quality of selected “sachet water” stored at room temperature over a period of 56 days was determined to evaluate the safety of the sachet drinking water. Test for the detection of coliform bacteria was performed, and the result showed no coliform bacteria that indicates the absence of fecal contamination throughout 56 days. Heterotrophic plate count (HPC) was done at an interval 14 days, and the samples showed HPC between 0 cfu/mL and 64 cfu/mL. The highest count was observed on day 1. The count decreased between day 1 and 28, while no growths were observed between day 42 and 56. The decrease in HPC suggested the presence of residual disinfectant in the water. The organisms isolated were identified as Staphylococcus epidermis and S. aureus. The presence of these microorganisms in sachet water is indicative for contamination during processing and handling.Keywords: coliform, heterotrophic plate count, sachet water, Staphyloccocus aureus, Staphyloccocus epidermidis
Procedia PDF Downloads 3411778 Candida antarctica Lipase-B Catalyzed Alkaline-Hydrolysis of Some Aryl-Alkyl Acetate in Non-Aqueous Media
Authors: M. Merabet-Khelassi, Z. Houiene, L. Aribi-Zouioueche, O. Riant
Abstract:
Lipases (EC.3.1.1.3) are efficient biotools widely used for their remarkable chemo-, regio- and enantio-selectivity, especially, in kinetic resolution of racemates. They offer access to a large panel of enantiopure building blocks, such as secondary benzylic alcohols, commonly used as synthetic intermediates in pharmaceutical and agrochemical industries. Due to the stability of lipases in both water and organic solvents poor in water, they are able to catalyze both transesterifications of arylalkylcarbinols and hydrolysis of their corresponding acetates. The use of enzymatic hydrolysis in aqueous media still limited. In this presentation, we expose a practical methodology for the preparation of optically enriched acetates using a Candida antarctica lipase B-catalyzed hydrolysis in non-aqueous media in the presence of alkaline carbonate salts. The influence of several parameters which can intervene on the enzymatic efficiency such as the impact of the introduction of the carbonates salts, its amount and the nature of the alkaline earth metal are discussed. The obtained results show that the use of sodium carbonate with CAL-B enhances drastically both reactivity and selectivity of this immobilized lipase. In all cases, the resulting alcohols and remaining acetates are obtained in high ee values (up to > 99 %), and the selectivities reach (E > 500).Keywords: alkaline-hydrolysis, enzymatic kinetic resolution, lipases, arylalkylcarbinol, non-aqueous media
Procedia PDF Downloads 1621777 Tracing the Direction of Media Activism: Public Perspective
Authors: G. Arockiasamy, B. Sujeevan Kumar, Surendheran
Abstract:
Human progress and development are highly influenced by the power of information access and technology. A global and multi-national transformation all over the word is possible due to digitalization. In the process of exchanging information, experience, and resources, there is a radical shift in who controls them. Mass media has turned the world into a global village by strengthening communication network. As a result, a new digital culture has emerged as a social network commonly known as new media. Today the advancement of technology is at the doorstep of everyone linking to anywhere. The traditional social restrictions are broken down by the new type of virtual communication modality that transcends people beyond boundaries At the same time media empire has invaded every nook and corner of the world through great expansion. Media activism is growing stronger and stronger but the truth and true meaning lost in the process. This paper explores the peoples’ attitude to media activism and tracing its direction. The methodology employed is random sampling survey and content analysis method. Both qualitatively and quantitatively measured. The findings tend to show 60 percent indicate media activism as positive and others indicate as negative. As a conclusion, media activism has danger within but depends on nature of the development of human orientation.Keywords: media activism, media industry, program, truth information, orientation and nature
Procedia PDF Downloads 2101776 Shaheen Bagh Protests: Women, Public Spaces, Citizenship and Dissent
Authors: Priyanka Joshi
Abstract:
The paper traces the evolving relationship between women, public spaces, and citizenship and dissent by analyzing acts of dissent led by women. The paper outlines this relationship in the context of the protests held in Shaheen Bagh, Delhi against the Citizenship Amendment Act (CAA), National Registry of Citizens (NRC), and National Population Register (NPR) in 2019. Additionally, the paper aims to explore how the multiple identities of the protestors in Shaheen Bagh affected the nature, implications, and responses to the protests. To do so, the paper will analyze three key areas in relationship with women, namely, public spaces, citizenship, and dissent. In doing so, it will examine the gendered access to public spaces and its implications on the realization of one’s citizenship rights. Moreover, it will explore the historical notions of citizenship, its contemporary understanding, the exclusionary nature of citizenship, and the conflict between community rights and individual rights with respect to women’s rights. In context of dissent, it will evaluate the understanding of dissent and trace the difference in the experience of dissent based on gender by reviewing social movements led and maintained by women. This paper will utilize secondary data to explore the questions it poses. This includes a study of books and journal articles in conjunction with media reports concerning gender, public spaces, citizenship, and dissent. It will apply an intersectional lens in its analysis.Keywords: citizenship, dissent, public spaces, Shaheen Bagh, women
Procedia PDF Downloads 1511775 Food Security in Nigeria: An Examination of Food Availability and Accessibility in Nigeria
Authors: Okolo Chimaobi Valentine, Obidigbo Chizoba
Abstract:
As a basic physiology need, the threat to sufficient food production is the threat to human survival. Food security has been an issue that has gained global concern. This paper looks at the food security in Nigeria by assessing the availability of food and accessibility of the available food. The paper employed multiple linear regression technique and graphic trends of growth rates of relevant variables to show the situation of food security in Nigeria. Results of the tests revealed that population growth rate was higher than the growth rate of food availability in Nigeria for the earlier period of the study. Commercial bank credit to the agricultural sector, foreign exchange utilization for food and the Agricultural Credit Guarantee Scheme Fund (ACGSF) contributed significantly to food availability in Nigeria. Food prices grew at a faster rate than the average income level, making it difficult to access sufficient food. It implies that prior to the year 2012; there was insufficient food to feed the Nigerian populace. However, continued credit to the food and agricultural sector will ensure sustained and sufficient production of food in Nigeria. Microfinance banks should make sufficient credit available to the smallholder farmer. The government should further control and subsidize the rising price of food to make it more accessible by the people.Keywords: food, accessibility, availability, security
Procedia PDF Downloads 3761774 Telecontrolled Service Robots for Increasing the Quality of Life of Elderly and Disabled
Authors: Nayden Chivarov, Denis Chikurtev, Kaloyan Yovchev, Nedko Shivarov
Abstract:
This paper represents methods for improving the efficiency and precision of service mobile robot. This robot is used for increasing the quality of life of elderly and disabled people. The key concept of the proposed Intelligent Service Mobile Robot is its easier adaptability to achieve services for a wide range of Elderly or Disabled Person’s needs, by performing different tasks for supporting Elderly or Disabled Persons care. We developed robot autonomous navigation and computer vision systems in order to recognize different objects and bring them to the people. Web based user interface is developed to provide easy access and tele-control of the robot by any device through the internet. In this study algorithms for object recognition and localization are proposed for providing successful object recognition and accuracy in the positioning. Different methods for sending movement commands to the mobile robot system are proposed and evaluated. After executing some experiments to show the results of the research, we can summarize that these systems and algorithms provide good control of the service mobile robot and it will be more useful to help the elderly and disabled persons.Keywords: service robot, mobile robot, autonomous navigation, computer vision, web user interface, ROS
Procedia PDF Downloads 3391773 Predisposition of Small Scale Businesses in Fagge, Kano State, Nigeria, Towards Profit and Loss Sharing Mode of Finance
Authors: Farida, M. Shehu, Shehu U. R. Aliyu
Abstract:
Access to finance has been recognized in the literature as one of the major impediments confronting small scale businesses (SSBs). This largely arises due to high lending rate, religious inclinations, collateral, etc. Islamic mode finance operates under Profit and Loss Sharing (PLS) arrangement between a borrower (business owner) and a lender (Islamic bank). This paper empirically assesses the determinants of predisposition of small scale business operators in Fagge local government area, Kano State, Nigeria, towards the PLS. Cross-sectional data from a sample of 291 small scale business operators was analyzed using logit and probit regression models. Empirical results reveal that while awareness and religion inclination positively drive interest towards the PLS, lending rate and collateral work against it. The paper, therefore, strongly recommends more advocacy campaigns and setting up of more Islamic banks in the country to cater for the financing and religious needs of SSBs in the study area.Keywords: Islamic finance, logit and probit models, profit and loss sharing small scale businesses, finance, commerce
Procedia PDF Downloads 3701772 Providing a Secure, Reliable and Decentralized Document Management Solution Using Blockchain by a Virtual Identity Card
Authors: Meet Shah, Ankita Aditya, Dhruv Bindra, V. S. Omkar, Aashruti Seervi
Abstract:
In today's world, we need documents everywhere for a smooth workflow in the identification process or any other security aspects. The current system and techniques which are used for identification need one thing, that is ‘proof of existence’, which involves valid documents, for example, educational, financial, etc. The main issue with the current identity access management system and digital identification process is that the system is centralized in their network, which makes it inefficient. The paper presents the system which resolves all these cited issues. It is based on ‘blockchain’ technology, which is a 'decentralized system'. It allows transactions in a decentralized and immutable manner. The primary notion of the model is to ‘have everything with nothing’. It involves inter-linking required documents of a person with a single identity card so that a person can go anywhere without having the required documents with him/her. The person just needs to be physically present at a place wherein documents are necessary, and using a fingerprint impression and an iris scan print, the rest of the verification will progress. Furthermore, some technical overheads and advancements are listed. This paper also aims to layout its far-vision scenario of blockchain and its impact on future trends.Keywords: blockchain, decentralized system, fingerprint impression, identity management, iris scan
Procedia PDF Downloads 1291771 Practices of Entomophagy and Entomotherapy in Baranggay Alambijud, Argao and Baranggay Lusaran, Cebu City, Philippines
Authors: Jake Joshua C. Garces, Zandra O. Jarito, Leslie Ann T. Barriga, Froilen C. Domicelo, Nimfa R. Pansit
Abstract:
The study was conducted in order to discover the medicinal and edible potentialities of different insect species in Baranggay Alambijud, Argao and Baranggay Lusaran, Cebu City, Cebu. In order to identify these entomological practices, a survey was carried out by the researchers in these key sites. Fourteen key informants were obtained and these were identified with the aide of two sampling methods- snowball technique and purposive sampling. Open-ended questionnaires were employed in order to obtain authentic and significant information from the key informants. Results portrayed that in the practice of entomotherapy, two insects were used as medicine namely: migratory locust (Locusta migratoria manillensis) and honey bee (Apis dorsata); and two insect by-products were utilized namely: feces of cockroach (Periplaneta Americana) and honey. White grub (Cotinis nitida) and bee eggs were also documented to manifest edible capability and were thus utilized in the entomophagic practices. After applying thematic analysis, it was determined that the causative factors of their entomological practices include their limited educational attainment, their inability to access urban societies and the influence brought about by their family and community.Keywords: entomophagy, entomotherapy, entomology, key informants
Procedia PDF Downloads 3351770 Convergence and Stability in Federated Learning with Adaptive Differential Privacy Preservation
Authors: Rizwan Rizwan
Abstract:
This paper provides an overview of Federated Learning (FL) and its application in enhancing data security, privacy, and efficiency. FL utilizes three distinct architectures to ensure privacy is never compromised. It involves training individual edge devices and aggregating their models on a server without sharing raw data. This approach not only provides secure models without data sharing but also offers a highly efficient privacy--preserving solution with improved security and data access. Also we discusses various frameworks used in FL and its integration with machine learning, deep learning, and data mining. In order to address the challenges of multi--party collaborative modeling scenarios, a brief review FL scheme combined with an adaptive gradient descent strategy and differential privacy mechanism. The adaptive learning rate algorithm adjusts the gradient descent process to avoid issues such as model overfitting and fluctuations, thereby enhancing modeling efficiency and performance in multi-party computation scenarios. Additionally, to cater to ultra-large-scale distributed secure computing, the research introduces a differential privacy mechanism that defends against various background knowledge attacks.Keywords: federated learning, differential privacy, gradient descent strategy, convergence, stability, threats
Procedia PDF Downloads 301769 Strategies and Perceptions of Small Olive Oil Farmers of By-Product Valorization
Authors: Judit Manuel-i-Martin, Mechthild Donner, Ivana Radic, Yamna Erraach, Fatima Elhadad, Taoufik Yatribi, Feliu Lopez-i-Gelats
Abstract:
This paper investigates how small olive farmers and olive oil producers implement circular economy practices to manage olive related waste and how such strategies are perceived by the farmers themselves. While there is a lot of data and research about possible uses of olive oil by-products, the perceptions and related practices of olive oil farmers is a much less investigated domain. A total of 60 semi-structured interviews were conducted in one of the most relevant olive oil producing regions in the Iberian Peninsula -the region of Terres de Ponent (Catalonia – Spain) - to examine the different by-product valorization strategies the olive oil farms develop. We test the hypothesis that the strategies conducted depend on the nature and amount of resources available by the farm. The results obtained point that access to milling infrastructure is a determining factor. We also found that olive tree pruning biomass and olive pomace are the most common by-products valorized by farmers, the first one on-farm and the latter in mills. Results indicate that high value uses for olive oil by-products are rarely implemented by farmers. We conclude that olive farmers tend to perceive by-product valorization strategies as waste management practices rather than as additional sources of value for their farm.Keywords: circular economy, discourses, Mediterranean region, olive oil by-products, farmers’ strategies, olive pomace
Procedia PDF Downloads 1341768 Study of Exciton Binding Energy in Photovoltaic Polymers and Non-Fullerene Acceptors
Authors: Ho-Wa Li, Sai-Wing Tsang
Abstract:
The excitonic effect in organic semiconductors plays a key role in determining the electronic devices performance. Strong exciton binding energy has been regarded as the detrimental factor limiting the further improvement in organic photovoltaic cells. To the best of our knowledge, only limited reported can be found in measuring the exciton binding energy in organic photovoltaic materials. Conventional sophisticated approach using photoemission spectroscopy (UPS and IPES) would limit the wide access of the investigation. Here, we demonstrate a facile approach to study the electrical and optical quantum efficiencies of a series of conjugated photovoltaic polymer, fullerene and non-fullerene materials. Quantitative values of the exciton binding energy in those prototypical materials were obtained with concise photovoltaic device structure. And the extracted binding energies have excellent agreement with those determined by the conventional photoemission technique. More importantly, our findings can provide valuable information on the excitonic dissociation in the first excited state. Particularly, we find that the high binding energy of some non-fullerene acceptors limits the combination of polymer acceptors for efficiency exciton dissociation. The results bring insight into the engineering of excitonic effect for the development of efficient organic photovoltaic cells.Keywords: organic photovoltaics, quantum efficiency, exciton binding energy, device physics
Procedia PDF Downloads 1511767 Challenges of Technical and Engineering Students in the Application of Scientific Cancer Knowledge to Preserve the Future Generation in Sub-Saharan Africa
Authors: K. Shaloom Mbambu, M. Pascal Tshimbalanga, K. Ruth Mutala, K. Roger Kabuya, N. Dieudonné Kabeya, Y. L. Kabeya Mukeba
Abstract:
In this article, the authors examine the even more worrying situation of girls in sub-Saharan Africa. Two-girls on five are private of Global Education, which represents a real loss to the development of communities and countries. Cultural traditions, poverty, violence, early and forced marriages, early pregnancies, and many other gender inequalities were the causes of this cancer development. Namely, "it is no more efficient development tool that is educating girls." The non-schooling of girls and their lack of supervision by liberal professions have serious consequences for the life of each of them. To improve the conditions of their inferior status, girls to men introduce poverty and health risks. Raising awareness among parents and communities on the importance of girls' education, improving children's access to school, girl-boy equality with their rights, creating income, and generating activities for girls, girls, and girls learning of liberal trades to make them self-sufficient. Organizations such as the United Nations Organization can save the children. ASEAD and the AEDA group are predicting the impact of this cancer on the development of a nation's future generation must be preserved.Keywords: young girl, Sub-Saharan Africa, higher and vocational education, development, society, environment
Procedia PDF Downloads 2541766 Social Networking Sites: A Platform for Communication and Collaboration for Visually Impaired
Authors: Sufia Khowaja, Nishat Fatima
Abstract:
Social networking sites are significant for visually impaired to overcome the unique challenges they face and access the resources they need to succeed in their education and beyond which might be difficult to obtain through traditional means. It provides them an opportunity to build relationships, stay connected with their support network as well as to develop social skills which give them emotional support to fell less isolated. In this connection the study is conducted with the aim to determine the use of social networking sites, purpose of using and activities performed by visually impaired at Delhi University, Delhi, Jawaharlal Nehru University, Delhi and Jamia Milia Islamia, Delhi. The study followed survey technique in which structured interview is followed to collect data from 137 visually impaired students and analysed using ‘SPSS ver23’. The findings of the study revealed that mostly used social networking sites are whatsapp by 89.23% students of DU, 95.12% of JNU, 87.09% of JMI, followed by e-mail by 78.46% of DU, 78.04% of JNU, 64.51%; youtube by 73.84% DU, 90.24% JNU, 80.64% JMI. Purpose for using these sites is for academics mentioned by 96.92% DU, 100% JNU, 93.54% JMI. Activities performed on sites are sending and receiving messaging 96.92% DU, 92.68% JNU, 93.55% JMI, communicating with friends and family as well as getting academic information. Findings of the study will be helpful for libraries to disseminate their services and resources as well as latest updates to their visually impaired users with the help of most used tools.Keywords: social networking sites, visually impaired, Delhi University, Jawaharlal Nehru University, Jamia Milia Islamia
Procedia PDF Downloads 90